Starting with the basics Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation...
Reporting on and auditing your Office 365 environment
Migrating to Office 365 can seem like an immense task, but making the switch itself is just the tip of the iceberg. The real challenge with Office 365 is keeping tabs...
Migrating HTTP to HTTPS: A top priority in 2018
Starting July 2018 with the release of Chrome browser version 68, Google Chrome will start marking all HTTP sites with a “Not secure” badge, even those that don’t deal...
Expired SSL certificate shuts down Oculus headsets around the world
Thousands upon thousands of affected Oculus Rifts was the last thing Oculus VR—a division of Facebook Inc. and developer of the Oculus Rift—wanted to wake up to. But after letting just...
GDPR prep steps—Part 1
The deadline for the General Data Protection Regulation (GDPR) is looming closer. Are you ready? In this two-part blog series, we’ll discuss the steps you can take to prepare for the...
Talk to our experts about the essentials of log management
Log management is a pillar of security information and event management (SIEM), and is critical to any organization’s security strategy. Logs document every event that occurs on your...
Gold Lowell uses SamSam ransomware to terrorize SMBs
From late December 2017 to mid January 2018, several small and medium businesses found themselves the victims of SamSam ransomware, in attacks propagated by the Gold...
A reminder to focus on securing your databases and web servers
The trend of global cyberattacks has continued into February. In California, The Sacramento Bee recently experienced a ransomware attack on its databases, exposing the voter registration details...
How to prioritize your top security alerts for better SIEM
Receiving alerts when a critical event occurs is the first step in responding to a security incident. But as any security expert knows, analyzing log data can get chaotic when you...